Tech Support for Safe Computer Use: Help Me Know the Difference between Virus and Trojan!
Tech Support for Safe Computer Use: Help Me Know the Difference between Virus and Trojan!
Today, as part of safe use of your personal computer especially while being online, you need to put in place right computer security practices. You need to protect your PC use and online data against harmful software programs that may be the result of programs created without malicious intention of anyone or programs created by others with a malicious intention in mind (malware).
What do virus, worm, malware, trojan horse, spyware, keyloggers, downloaders, and phising emails actually mean?
Though virus is often incorrectly referred to all sorts of malicious programs, virus and malwares are technically two different things.
A virus can be any program that can replicate itself and infect a computer. The reason is the software coded, which may be intentional or unintentional. If it is unintentional, it may have been got coded because of not using right programming methodology by the programmer.
Malware is a program that is created purposefully to disrupt a system. Thus, malware can be any program loaded onto your computer system keeping malicious intention in mind.
Virus can spread from one computer to another when it receives the virus from the host. As a result, a virus can infect if a user sends it over a network or the internet or carried it on a removable device such as CD, DVD, floppy, or USB drive.
Like virus, worms do replicate themselves. But we can distinguish virus and worm under one important paramenter: worm is a class of replicable program that does not require a human action to replicate itself throughout your computer network which you use to share files/folders etc. They take advantage of file or information setup of your system and gets executed by themselves. It may harness security flaws in the operating system setup.
The big threat with a worm is its capability to replicate itself on your system manifold times. It can create hundreds or thousands of copies of itself: for example, a code would be made of a copy to replicate itself and send email to everyone listed on your customers' list. Then a single worm would send an email to tens and thousands of customers. Because of their copying nature, they also consume a lot of system memory (or network bandwidth) leading Web servers, network servers, and individual computers to slow down or even stop responding.
A Trojan Horse is a malware that at first glance would appear to be a useful software. You may be tricked to buy it but once installed or run will actually damage your computer. Some trojans create a backdoor on your computer giving malicious users access to your system. The trojans do not replicate by infecting other files nor do they self-replicate.
Spyware is a type of program that is secretly installed on computers and collects small chunks of information about users without their knowledge. For a general PC user who is also often online, invasion from spyware takes place when someone is online on PC and malicious software programs get loaded onto their system. Spyware is a program that seeks to monitor your internet use and steal confidential data in the process. While some spywares monitor silently in a hidden way, others appear as popups that are vaguely related with your internet search and try to have a click from you. The impact of spyware can be limited not just to monitoring. They can also interfere with user control of the computer in other ways. They can lead to additional software installed onto your system or redirecting Web browser activity.
Keyloggers are programs that track the keys struck on a keyboard in a hidden manner so that users do not know that their actions are monitored. They may seek to steal your passwords when you login to a particular site or online account.
Downloaders attempt to download software programs in the background.
Phising emails are emails that are send with the purpose of stealing information. Such emails can come with a link asking you to click in order to update your account, etc., which is nothing but a false claim. You may be carried to a site whose web pages will give you the impression that you are visiting the website of your local bank. By persuading you to fill details there, they will get past secret information such as your credit card password no, banking account password.
In an environment where online use is a part and parcel of any individual or business house, running latest security patches are important. It is best to choose a right technology partner who can take care of all your computer security needs at one place in an integrated way. By paying a small monthly payment, you take precautions against any online threat that may harm you while being online.
Your online computer service provider can provide you excellent computer security services because it has specialized to provide tech support services in a very competitive way. While providing you with a remote repair facility, it has large number of customers whose needs are similar to you. As a result, costs involved for you as an individual customer is very low. Yet, you get very specialized services for your tech support needs in a remarkably outstanding way!
Technical Features of Memory card reader Finding A Great Professional Printing Firm To Print Quality Restaurant Menus That Grab Attention Why do we need memory stick ? The 9limited Programs $100m Investment Fund Quality T Shirt Printing - State Your Message With Ease Car Dvd Agents----to Have The Best Price Remove SpyAxe - How To perform a SpyAxe Removal On Your Computer Remove PCclear - How To perform a PCclear Removal On Your Computer Remove SpywareDetector - How To perform a SpywareDetector Removal On Your Computer Cross Over Between Smart Phones And Computers Realistic Effective Weight Loss Programs How to Build Your Own Computer: Some Useful Tips Why is My Computer So Slow?
Tech Support for Safe Computer Use: Help Me Know the Difference between Virus and Trojan!